Example sentences of "[conj] [n mass] [vb pp] [prep] " in BNC.

  Next page
No Sentence
1 In this sense the committee chairman who attempts to hide behind the lack of a definition of pain will , to be consistent , need to be sceptical of the noisy contortions of a cow or sheep crushed by a tractor .
2 The 1991 figure of 585 casualties shows a marked reduction of 65 or 10% compared with the 1990 total of 650 casualties .
3 S 1(1) provides that ‘ a person is guilty of an offence if — ( a ) he causes a computer to perform any function to secure access to any program or data held in any computer ; ( b ) the access he intends to secure is unauthorised ; and ( c ) he knows at the time when he causes the computer to perform the function that that is the case ’ .
4 The relevant words are ‘ he causes a computer to perform any function with intent to secure access to any program or data held in any computer ’ .
5 Therefore s 1(1) was contravened when , as happened in the present case , a person caused a computer to perform a function with intent to secure unauthorised access to any program or data held in the same computer .
6 BGS receives many requests for site-specific information and for access to reference collections or data held in the archives .
7 Crime — Computer misuse — Unauthorised access — Person using one computer to obtain from it unauthorised benefit — Whether unauthorised use of single computer within statute — ‘ Access to any program or data held in any computer ’ — Computer Misuse Act 1990 ( c. 18 ) , ss. 1(1) , 2(1)
8 Held , that , in the opinion of the court , in section 1(1) ( a ) of the Act of 1990 the words ‘ causes a computer to perform any function with intent to secure access to any program or data held in any computer , ’ in their plain and ordinary meaning , were not confined to the use of one computer with intent to secure access into another computer ; so that section 1(1) was contravened where a person caused a computer to perform a function with intent to secure unauthorised access to any program or data held in the same computer ( post , pp. 437A–B , C–D , 438A , E–F ) .
9 Held , that , in the opinion of the court , in section 1(1) ( a ) of the Act of 1990 the words ‘ causes a computer to perform any function with intent to secure access to any program or data held in any computer , ’ in their plain and ordinary meaning , were not confined to the use of one computer with intent to secure access into another computer ; so that section 1(1) was contravened where a person caused a computer to perform a function with intent to secure unauthorised access to any program or data held in the same computer ( post , pp. 437A–B , C–D , 438A , E–F ) .
10 It seems to me to be straining language to say that only one computer is necessary when one looks to see the actual wording of the subsection : ‘ Causing a computer to perform any function with intent to secure access to any program or data held in any computer . ’ ’
11 ‘ It is submitted : ( i ) the judge erred in law in his ruling on count 1 ; ( ii ) for an offence to be committed under section 1(1) of the Act there does not have to be the use by the offender of one computer with intent to secure unauthorised access into another computer ; ( iii ) there is no ambiguity in the wording of section 1(1) ( a ) of the Act which clearly refers to an intent to secure access to any program or data held in any computer ; ( iv ) section 17(2) and ( 3 ) are applicable to the alleged actions of the respondent in this case ; ( v ) the Act has been drafted so as to deal with the person who misuses a computer to which he has direct ( but unauthorised ) access , as well as a computer into which he is able to secure indirect access by operating another computer . ’
12 ‘ A person is guilty of an offence if — ( a ) he causes a computer to perform any function with intent to secure access to any program or data held in any computer ; ( b ) the access he intends to secure is unauthorised ; and ( c ) he knows at the time when he causes the computer to perform the function that that is the case .
13 ( 2 ) For the purposes of subsection ( 1 ) ( b ) above the requisite intent is an intent to cause a modification of the contents of any computer and by so doing — ( a ) to impair the operation of any computer ; ( b ) to prevent or hinder access to any program or data held in any computer ; or ( c ) to impair the operation of any such program or the reliability of any such data .
14 ‘ ( 2 ) A person secures access to any program or data held in a computer if by causing a computer to perform any function he — ( a ) alters or erases the program or data ; ( b ) copies or moves it to any storage medium other than that in which it is held or to a different location in the storage medium in which it is held ; ( c ) uses it ; or ( d ) has it output from the computer in which it is held ( whether by having it displayed or in any other manner ) ; and references to access to a program or data ( and to an intent to secure such access ) shall be read accordingly .
15 … ( 7 ) A modification of the contents of any computer takes place if , by the operation of any function of the computer concerned or any other computer — ( a ) any program or data held in the computer concerned is altered or erased ; or ( b ) any program or data is added to its contents ; and any act which contributes towards causing such a modification shall be regarded as causing it . …
16 It seems to me to be straining language to say that only one computer is necessary when one looks to see the actual wording of the subsection ; ‘ causing a computer to perform any function with intent to secure access to any program or data held in any computer . ’
17 They are , ‘ he causes a computer to perform any function with intent to secure access to any program or data held in any computer . ’
18 However , if one looks at section 3 it is — we do not need to decide the point — at least doubtful whether it would apply to the circumstances of the present case , because the requisite intent which has to be present before section 3 is breached is the intent under subsection ( 2 ) of section 3 , ‘ ( a ) to impair the operation of any computer ’ — that clearly does not apply to what the respondent did here — ‘ ( b ) to prevent or hinder access to any program or data held in any computer ’ — that again clearly does not apply to what the respondent did here — and ‘ ( c ) to impair the operation of any such program ’ — that does not apply here .
19 The small disc is inserted into the floppy drive of the computer and the program can then be run or installed or data read from the disk .
20 caravans , watercraft or hovercraft owned by the Insured Person or hired by him/her under a hire purchase agreement ;
21 Nensey et al recently reported that nine ( 75% ) of their 12 H pylori negative patients with DU were taking NSAIDs or aspirin compared with 33% of their H pylori positive patients with DU .
22 As dry air has curative properties , any meat or fish hung in the cleits dried off without going rotten and would then ‘ keep ’ for months .
23 The food was predictably stodgy — steak pie or fish fried in batter , chips , boiled cabbage and tinned peas , sponge pudding and custard — but it was astonishingly cheap : 50p for the whole menu .
24 So discrimination against smokers or fat people or people born in February is not illegal .
25 Have you , at any time , sent threatening letters to members of the Bamford Hunt or people connected with it ?
26 No cars or people moved in the street outside .
27 There are no trade union representatives , or people nominated by the Scottish TUC .
28 Stocker was at pains to say : ‘ We have nothing which could be tested on humans … nothing yet which can help Aids patients or people infected with the Aids virus or any other virus . ’
29 At present these are alkali works or works mentioned in the first schedule of the 1906 Act , as amended by the Health and Safety ( Emissions into the Atmosphere ) Regulations 1983 ( S.1 .
30 It should be noted that the programme will have been more than 50% spent by then ( around £4m ) .
  Next page